@@ -232,26 +232,27 @@ func (a *AuthConfig) createOrUpdateAuthTokenSecret(kubeconfigPath string) error
232232 return err
233233 }
234234 // Calculate 24 hours before the expiration time
235- thresholdTime := expiryTime .Add (- 24 * time .Hour )
235+ thresholdTime := expiryTime .UTC (). Add (- 24 * time .Hour )
236236 // Check if current time is past the thresholdTime time of 24 hours
237237 if time .Now ().UTC ().After (thresholdTime ) {
238238 // update the secret in the cluster with a new token from asset store
239239 err = a .refreshAuthTokenSecret (k8sclientset , retrievedSecret )
240240 if err != nil {
241241 return err
242242 }
243- logrus .Debug ("Auth token secret regenerated and updated in the cluster" )
244243 } else {
245244 // Update the token in asset store with the retrieved token from the cluster
246245 a .AgentAuthToken = retrievedToken
246+ // get the token expiry time of the retrieved token from the cluster
247+ a .AgentAuthTokenExpiry = expiryTime .UTC ().Format (time .RFC3339 )
247248
248249 retrievedPublicKey , err := extractPublicKeyFromSecret (retrievedSecret )
249250 if err != nil {
250251 return err
251252 }
252253 // Update the asset store with the retrieved public key associated with the valid token from the cluster
253254 a .PublicKey = retrievedPublicKey
254- logrus .Debugf ("Reusing existing auth token (valid up to %s)" , expiryTime )
255+ logrus .Infof ("Reusing existing auth token (valid up to %s)" , a . AgentAuthTokenExpiry )
255256 }
256257 return err
257258}
@@ -261,8 +262,10 @@ func (a *AuthConfig) createSecret(k8sclientset kubernetes.Interface) error {
261262 secret := & corev1.Secret {
262263 ObjectMeta : metav1.ObjectMeta {
263264 Name : authTokenSecretName ,
265+ // only for informational purposes
264266 Annotations : map [string ]string {
265267 "updatedAt" : "" , // Initially set to empty
268+ "expiresAt" : a .AgentAuthTokenExpiry ,
266269 },
267270 },
268271 Type : corev1 .SecretTypeOpaque ,
@@ -273,9 +276,10 @@ func (a *AuthConfig) createSecret(k8sclientset kubernetes.Interface) error {
273276 }
274277 _ , err := k8sclientset .CoreV1 ().Secrets (authTokenSecretNamespace ).Create (context .Background (), secret , metav1.CreateOptions {})
275278 if err != nil {
276- return fmt .Errorf ("failed to create auth token secret: %w" , err )
279+ return fmt .Errorf ("failed to create secret: %w" , err )
277280 }
278- logrus .Debugf ("Created auth token secret %s/%s" , authTokenSecretNamespace , authTokenSecretName )
281+ logrus .Infof ("Generated auth token (valid up to %s)" , a .AgentAuthTokenExpiry )
282+ logrus .Infof ("Created secret %s/%s" , authTokenSecretNamespace , authTokenSecretName )
279283
280284 return nil
281285}
@@ -285,12 +289,14 @@ func (a *AuthConfig) refreshAuthTokenSecret(k8sclientset kubernetes.Interface, r
285289 retrievedSecret .Data [authTokenPublicDataKey ] = []byte (a .PublicKey )
286290 // only for informational purposes
287291 retrievedSecret .Annotations ["updatedAt" ] = time .Now ().UTC ().Format (time .RFC3339 )
292+ retrievedSecret .Annotations ["expiresAt" ] = a .AgentAuthTokenExpiry
288293
289294 _ , err := k8sclientset .CoreV1 ().Secrets (authTokenSecretNamespace ).Update (context .TODO (), retrievedSecret , metav1.UpdateOptions {})
290295 if err != nil {
291296 return err
292297 }
293- logrus .Debugf ("Updated auth token secret %s/%s" , authTokenSecretNamespace , authTokenSecretName )
298+ logrus .Infof ("Auth token regenerated (valid up to %s)" , a .AgentAuthTokenExpiry )
299+ logrus .Infof ("Updated secret %s/%s" , authTokenSecretNamespace , authTokenSecretName )
294300 return nil
295301}
296302
0 commit comments